Don't-Miss Encryption Stories
Security companies, including Moscow-based Kaspersky Lab and U.S. antivirus vendor Symantec, have not yet figured out what kind of data Shamoon is looking for, then stealing.
New draft encryption guidelines from the NIST call for support for more secure extended validation certificates.
For Wi-Fi networks that are properly using 802.1X authentication, and that have transport layer security properly implemented, the impact of this exploit is essentially zero, experts say.
The SpiderOak secure online backup service protects you by encrypting your data with keys that only you know.
Security researchers released two tools at the Defcon security conference that can beat the encryption of certain PPTP sessions in less than a day's work.
The passwords used by the eHarmony site visitors shows that names of sports teams, dogs, states and masculine and feminine names formed the foundation of many of the passwords.
Enddylopez asked the Hard Drives, NAS Drives, Storage forum about password protecting a flash drive
Encryption is a crucial part of computer and data security, but don't ever make the mistake of believing any encryption is "unbreakable".
A new startup's free app anonymizes and encrypts your connection, and scans for malware, while you browse.
Secret wartime projects drove "incredible" advances, and the German Enigma cypher machine is still a challenge for codebreakers.
Microsoft issued a security advisory after discovering that the 'Flame' malware attack exploits a flaw to appear as if it's legitimate code from Microsoft.
An astonishing 20KB in size, Tinba retains enough sophistication to match almost anything that can be done by much larger malware types.
Jeff Hudgins removed the hard drive from a dying computer, and via USB plugged it into a new PC. But he can't access his files. They're encrypted.
Data encryption is a complicated subject, but our top-level overview and general guide to email encryption will help you understand the basics. Learn to encrypt your Internet connection, sent and stored email with this basic tutorial.
Intel's new Ivy Bridge processors are faster and more efficient than previous CPUs, and--thanks to 'Bull Mountain'--they're also more secure.